Sciweavers

2454 search results - page 364 / 491
» Privacy in the Information and Communications Technologies
Sort
View
ISW
2005
Springer
15 years 7 months ago
Universally Composable Time-Stamping Schemes with Audit
Abstract. We present a universally composable time-stamping scheme based on universal one-way hash functions. The model we use contains an ideal auditing functionality (implementab...
Ahto Buldas, Peeter Laud, Märt Saarepera, Jan...
JSAI
2005
Springer
15 years 7 months ago
Detection of Assessment Patterns in Ordinary Triadic Conversation
Abstract.Abstract.Abstract. This article outlines a three-party conversation corpus built by the National Institute of Information and Communications Technology (Section 2) and int...
Katsuya Takanashi, Eiki Fujimoto, Yasuyuki Kono, K...
PCI
2005
Springer
15 years 7 months ago
Middleware for Building Ubiquitous Computing Applications Using Distributed Objects
Ubiquitous systems are characterized by multi-fold complexity, stemming mainly from the vast number of possible interactions between many heterogeneous objects and services. Device...
Nicolas Drossos, Eleni Christopoulou, Achilles Kam...
85
Voted
IMC
2004
ACM
15 years 7 months ago
The root of the matter: hints or slaves
We consider the possibility of having a (recursive) name server act as a slave to the root zone, rather than caching information after it is requested. Tests, described here, indi...
David Malone
ISCIS
2004
Springer
15 years 7 months ago
Modelling Role-Playing Games Using PEPA Nets
Abstract. We present a performance modelling case study of a distributed multi-player game expressed in the PEPA nets modelling language. The case study provides a modern complex d...
Stephen Gilmore, Leïla Kloul, Davide Piazza